Step 1: Create an OIDC App in Okta
Log in to Okta Admin Console.
Go to Applications → Applications → Create App Integration.
Select:
Sign-in method: OIDC – OpenID Connect
Application type: Web Application
Click Next.
Configure General Settings:
App name: Coassemble
Grant type allowed: Authorization Code (required)
Enable Refresh Token
Redirect URI:
https://yourdomain.coassemble.com/security/login/check-custom
Sign-out redirect URI: (optional)
https://yourdomain.coassemble.com
Click Save.
Copy the Client ID and Client Secret — you’ll need these in Coassemble.
Step 2: Assign Users to the App
Go to Applications → [Coassemble App] → Assignments → Assign → Assign to People.
Select the users or test group you want to allow SSO access.
Ensure status = Active.
Step 3: Configure OAuth in Coassemble
In your Coassemble Admin panel:
Authorization URL:
https://<yourOktaDomain>/oauth2/v1/authorize
Access Token URL:
https://<yourOktaDomain>/oauth2/v1/token
UserInfo URL:
https://<yourOktaDomain>/oauth2/v1/userinfo
Scopes:
openid profile email
Identifier / Email claim:
email
Step 4: Test SSO Login
Open a private/incognito browser window.
Go to Coassemble → login via SSO.
Log in as a test user assigned to the app.
You should be redirected successfully into Coassemble.
Troubleshooting
System Log: Okta → Reports → System Log → filter by user.
Common errors:
no_matching_policy
→ Authorization Server rule missing / misconfiguredinvalid_redirect_uri
→ Redirect URI mismatchpolicy_denied
→ Authentication policy (MFA or device restrictions) blocking the login
To Configure Authorization Server Policy
Change your Authorization URLs in Coassemble
Authorization URL:https://<yourOktaDomain>/oauth2/default/v1/authorize
Access Token URL:
https://<yourOktaDomain>/oauth2/default/v1/token
UserInfo URL:
https://<yourOktaDomain>/oauth2/default/v1/userinfo
This step ensures the OIDC token request succeeds.In Okta Admin: Security → API → Authorization Servers → default → Access Policies
Click Add Policy:
Name:
Coassemble OIDC Token Access
Assign to: test user(s) or a test group
Click Add Rule:
Name:
Allow OAuth
Grant type: Authorization Code
User: Any user assigned the app
Scopes: Any scopes
Access: Allow
Move this rule to the top of the list.
Save.
This prevents the
no_matching_policy
error when Coassemble requests a token.
Notes / Tips
Make sure the Redirect URI in Okta matches exactly what Coassemble provides.
For public clients, token requests cannot satisfy hardware MFA automatically.
Test with a dedicated test user or group before rolling out to your org.